No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Log Reference

S9300, S9300E, and S9300X V200R010C00

This document provides the explanations, causes, and recommended actions of logs on the product.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
SECE/4/IPSG_DROP_PACKET

SECE/4/IPSG_DROP_PACKET

Message

SECE/4/IPSG_DROP_PACKET:IP packets,dropped by IPSG.(SourceInterface=[STRING],DropPacketNumber=[ULONG],DroptTime=[STRING])

Description

IP packets are discarded by IPSG.

Parameters

Parameter Name Parameter Meaning

[STRING]

Indicates the source interface of the packets.

[ULONG]

Indicates the number of discarded packets.

[STRING]

Indicates the packet discard time.

Possible Causes

The device receives an IP packet that does not match any entry in the DHCP snooping binding table.

Procedure

  • Find out the interface where attacks occur according to Interface in the alarm message.
  • Run the display dhcp snooping user-bind command to check whether users who are not in the DHCP snooping binding table range are connected.
  • If new users are connected, run related DHCP snooping commands to generate the DHCP snooping binding entry.
Translation
Download
Updated: 2019-08-21

Document ID: EDOC1000142069

Views: 540041

Downloads: 37

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next